Threat Actors Flashcards

Section 3

1
Q

An individual or entity responsible for incidents that impact security and data protection.

A

Threat Actor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Specific characteristics or properties that define and differentiate various threat actors from one another

A

Threat Actor Attributes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Individuals with limited technical expertise who use readily available tools like downloaded scripts or exploits to carry out attacks

A

Unskilled Attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cyber attackers who carry out their activities driven by political, social, or environmental ideologies who often want to draw attention to a specific cause

A

Hacktivists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Well-structured groups that execute cyberattacks for financial gain, usually through methods like ransomware, identity theft, or credit card fraud

A

Organized Crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Highly skilled attackers that are sponsored by governments to carry out cyber espionage, sabotage, or cyber warfare against other nation states or specific targets in a variety of industries.

A

Nation-state Actors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Security threats that originate from within the organization

A

Insider Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IT systems, devices, software, applications, and services that are managed and utilized without explicit organizational approval

A

Shadow IT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Decoy systems or servers designed to attract and deceive potential attackers, simulating real-world IT assets to study their techniques

A

Honeypots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Creates an entire network of decoy systems to observe complex, multi-stage attacks

A

Honeynets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Decoy files placed within systems to detect unauthorized access or data breaches

A

Honeyfiles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Fake pieces of data, like a fabricated user credential, inserted into databases or systems to alert administrators when they are accessed or used.

A

Honeytokens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What threat actor motivation is the unauthorized transfer of data from a computer

A

Data Exfiltration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What threat actor motivation is one of the most common motivation for cybercriminals

A

Financial Gain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What threat actor motivation is where the attacker obtains sensitive or compromising information about an individual or an organization and threatens to release this information to the public unless certain demands are met

A

Blackmail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Often achieved by conducting a Distributed Denial of Service (DDoS) attack to overwhelm a network, service, or server with excessive amounts of traffic so that it becomes unavailable to its normal users

A

Service Disruption

17
Q

Individuals or groups use hacking to promote a political agenda, social change, or to protest against organizations they perceive as unethical

A

Philosophical or Political Beliefs

18
Q

Attacks that are conducted due to philosophical or political beliefs of the attackers or socially motivated purposes is known as

A

Hacktivism

19
Q

Ethical hackers, also known as Authorized hackers, are motivated by a desire to improve security

A

Ethical Reasons

20
Q

An employee who is disgruntled, or one who has recently been fired or laid off, might want to harm their current or former employer by causing a data breach, disrupting services, or leaking sensitive information

A

Revenge

21
Q

These actors, often referred to as unauthorized hackers, engage in malicious activities for the thrill of it, to challenge their skills, or simply to cause harm

A

Disruption or chaos

22
Q

Involves spying on individuals, organizations, or nations to gather sensitive or classified information

A

Espionage

23
Q

Cyberattacks have increasingly become a tool for nations to attack each other both on and off the battlefield

A

War

24
Q

Individuals or entities within an organization who pose a threat to its security.

A

Internal Threat Actors

25
Q

Individuals or groups outside an organization who attempt to breach its cybersecurity defenses

A

External Threat Actors

26
Q

Refers to the tools, skills, and personnel at the disposal of a given threat actor

A

Resources and Funding

27
Q

Refers to their technical skills, the complexity of the tools and techniques they use, and their ability to evade detection and countermeasures.

A

Level of Sophistication and Capability

28
Q

The classification name for the low skill. An individual with limited technical knowledge who uses pre-made software or scripts to exploit computer systems and networks often without understanding the underlying principles

A

Script Kiddie

29
Q

An individual who lacks the technical knowledge to develop their own hacking tools or exploits

A

Unskilled Attackers (Script Kiddie)

30
Q

Highly skilled group primarily motivated by their ideological beliefs rather than trying to achieve financial gains

A

Hacktivists

31
Q

Sophisticated and well-structured entities that leverage resources and high technical skills for illicit gain

A

Organized Cyber Crime Groups

32
Q

Sophisticated cybercrime syndicate that has been linked to numerous high-profile data breaches

A

FIN7

33
Q

Sophisticated cybercrime syndicate that has stolen over $1 billion from various banks around the world

A

Carbanak

34
Q

Groups that are sponsored by a government to conduct cyber operations against other nations, organizations, or individuals

A

Nation-State Actors

35
Q

Attack that is orchestrated in such a way that it appears to originate form a different source or group.

A

False Flag Attack

36
Q

Term that used to be used synonymously with a nation-state actor because of their long-term persistence and stealth

A

Advanced Persistent Threat

37
Q

A prolonged and targeted cyberattack in which an intruder gains unauthorized access to a network and remains undetected for a long period of time.

A

Advanced Persistent Threat